My experience on my daily works... helping others ease each other

Wednesday, September 25, 2013

SWOT analysis (strengths, weaknesses, opportunities and threats analysis)

SWOT analysis (strengths, weaknesses, opportunities, and threats analysis) is a framework for identifying and analyzing the internal and external factors that can have an impact on the viability of a project, product, place or person. 
The framework is credited to Albert Humphrey, who tested the approach in 1960s and 1970s at the Stanford Research Institute (SRI). Developed for business and based on data from Fortune 500 companies, the SWOT analysis has been adopted by organizations of all types as an aid to making decisions.
As its name states, a SWOT analysis examines four elements:
  • Strengths - internal attributes and resources that support a successful outcome.
  • Weaknesses - internal attributes resources that work against a successful outcome.
  • Opportunities - external factors the project can capitalize on or use to its advantage.
  • Threats - external factors that could jeopardize the project.
Share:

Tuesday, September 10, 2013

Internet Society Responds to Reports of the U.S. Government’s Circumvention of Encryption Technology

Internet Society Responds to Reports of the U.S. Government’s Circumvention of Encryption Technology

The Internet Society is alarmed by continuing reports alleging systematic United States government efforts to circumvent Internet security mechanisms.  The Internet Society President and CEO, Lynn St. Amour, said,  “If true, these reports describe government programmes that undermine the technical foundations of the Internet and are a fundamental threat to the Internet’s economic, innovative, and social potential. Any systematic, state-level attack on Internet security and privacy is a rejection of the global, collaborative fabric that has enabled the Internet's growth to extend beyond the interests of any one country.”

The Internet Society believes that global interoperability and openness of the Internet are pre-requisites for confidence in online interaction, they unlock the Internet as a forum for economic and social progress, and they are founded on basic assumptions of trust. We are deeply concerned that these principles are being eroded and that users' legitimate expectations of online security are being treated with contempt.
As the institutional home of the Internet Engineering Task Force (IETF), we believe that open and transparent processes are essential for security standardization, and result in better outcomes than any alternative approach.  For example, protocols developed by the IETF are open for all to see, inspect, and verify, as are the open and inclusive processes by which they are specified. 

IETF Chairman Jari Arkko has strongly reiterated the IETF’s commitment to improving security in the Internet, and to seeking ways of improving security protocols in light of these new revelations and security threats.  “The IETF has a long-standing commitment to openness and transparency in developing security protocols for the Internet, and sees this as critical to confidence in their use and implementation.”  To read more, visit:  http://www.ietf.org/blog/2013/09/security-and-pervasive-monitoring/.

However, the open development of robust technical specifications is just one link in the chain. Security standards must be properly implemented and used. This is a wake-up call for technology developers and adopters alike, to reexamine what we can do to ensure that all links in the chain are equally strong. This is key to helping restore public trust and confidence in the Internet.

The Internet has tremendous potential for economic and social good, but unless all stakeholders trust the Internet as a safe place for business, social interaction, academic enquiry, and self-expression, those economic and social benefits are put at risk. To fulfill its potential, the Internet must be underpinned by the right combination of technology, operational processes, legislation, policy, and governance. The recent reports suggest that U.S. Government programmes have systematically undermined some or all of those measures, and that is why we view the revelations with such grave concern.

With this mind, we issue these calls to action for the global community:

• To every citizen of the Internet: let your government representatives know that, even in matters of national security, you expect privacy, rule of law, and due process in any handling of your data.

Security is a collective responsibility that involves multiple stakeholders.  In this regard, we call on:

• Those involved in technology research and development: use the openness of standards processes like the IETF to challenge assumptions about security specifications.

• Those who implement the technology and standards for Internet security: uphold that responsibility in your work, and be mindful of the damage caused by loss of trust.

• Those who develop products and services that depend on a trusted Internet: secure your own services, and be intolerant of insecurity in the infrastructure on which you depend.

• To every Internet user: ensure you are well informed about good practice in online security, and act on that information. Take responsibility for your own security.

At the Internet Society, we remain committed to advancing work in areas such as browser security, privacy settings, and digital footprint awareness in order to help users understand and manage their privacy and security.  The citizens of the Internet deserve a global and open platform for communication built on solid foundations of security and privacy.

As email by ISOC
Share:

Tuesday, September 3, 2013

VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE


Software vulnerabilities are regard as the most critical vulnerabilities due to its impact and availability as compared to hardware and network vulnerabilities. Throughout the years from the first appearance of software vulnerabilities in late 80s until today, there are many identified and classified software vulnerabilities such as the well-known buffer overflow, scripting and SQL command. We studied on those known software vulnerabilities, compared the criticality, impact and significant of the vulnerabilities, and further predicted the trend of the vulnerabilities and proposed the focus area based on the comparative studies. The result shows that C overflow vulnerabilities will continue to persist despite losing its dominance in terms of numbers of availability and exploitation. However, the impact of exploiting the C overflow vulnerabilities is still regard as the most critical as compare to others. Therefore, C overflow vulnerabilities will prevail again and continues its domination as it did for the past two decades.

The complete paper can be retrieve here (coming soon).

The presentation slide is available here (click the image below)

or can be view at slideshare as shown below



Share:

Sunday, September 1, 2013

About Me

Somewhere, Selangor, Malaysia
An IT by profession, a beginner in photography

Blog Archive

Blogger templates